FEATURE BASED WATERMARKING SCHEME FOR IMAGE AUTHENTICATION

被引:5
|
作者
Liu, Hongmei [1 ]
Rao, Junhui [1 ]
Yao, Xinzhi [1 ]
机构
[1] Sun Yat Sen Univ, Dept Elect & Commun, Guangzhou 510275, Guangdong, Peoples R China
关键词
Image Authentication; Zernike moments; content based watermark; semi-fragile;
D O I
10.1109/ICME.2008.4607413
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Our previous paper [1] proposed to use Zernike moments magnitudes (ZMMs) of the image for authentication. We demonstrated the good robustness and discriminative capability of this feature vector and proposed a structure embedding method for the watermark generated from this feature vector to locate the tampered area. In this paper, we extend and improve the algorithm in [1] in the following ways: 1) embedding watermark in an image will affect its feature vector, we split the original image into several spaces randomly, one for generating feature vector, one for embedding ZMM based watermark. Thus, we can remove the effect of watermarking itself on the feature vector generating, 2) presenting a two-stage authentication method and improve the discriminating capability of the authentication. Compared with the existing approaches, the proposed scheme has better performance of discriminating high quality JPEG compression from malicious manipulations.
引用
收藏
页码:229 / 232
页数:4
相关论文
共 50 条
  • [21] An image feature based robust digital watermarking scheme
    Tang, CW
    Hang, HM
    [J]. SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS IV, 2002, 4675 : 584 - 595
  • [22] Wavelet-based fragile watermarking scheme for image authentication
    Li, Chang-Tsun
    Si, Huayin
    [J]. JOURNAL OF ELECTRONIC IMAGING, 2007, 16 (01)
  • [23] A watermarking-based image ownership and tampering authentication scheme
    Chang, CC
    Hu, YS
    Lu, TC
    [J]. PATTERN RECOGNITION LETTERS, 2006, 27 (05) : 439 - 446
  • [24] A content based image watermarking scheme for authentication using quadtrees
    Parameswaran, Latha
    Anburnani, K.
    [J]. 2006 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATIONS, VOLS 1 AND 2, 2007, : 146 - +
  • [25] A novel watermarking-based reversible image authentication scheme
    Gao, Tiegang
    Gu, Qiaolun
    [J]. 2008 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2008, : 1269 - +
  • [26] A Robust Feature-based Image Watermarking Scheme
    Lai, Chih-Chin
    Chan, Chi-Feng
    Ouyang, Chen-Sen
    Chiang, Hui-Fen
    [J]. 2013 14TH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD 2013), 2013, : 581 - 585
  • [27] Oblivious fragile watermarking scheme for image authentication
    Li, CT
    Yang, FM
    Lee, CS
    [J]. 2002 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS I-IV, PROCEEDINGS, 2002, : 3445 - 3448
  • [28] A Dynamic Watermarking Scheme for Color Image Authentication
    Bandyopadhyay, Pradosh
    Das, Soumik
    Paul, Shauvik
    Chaudhuri, Atal
    Banerjee, Monalisa
    [J]. 2009 INTERNATIONAL CONFERENCE ON ADVANCES IN RECENT TECHNOLOGIES IN COMMUNICATION AND COMPUTING (ARTCOM 2009), 2009, : 314 - +
  • [29] A Lossless Watermarking Scheme for Halftone Image Authentication
    Pan, Jeng-Shyang
    Luo, Hao
    Lu, Zhe-Ming
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (2B): : 147 - 151
  • [30] Security of fragile watermarking scheme for image authentication
    Liao, K-C
    Lee, W-B
    Liao, C-W
    [J]. IMAGING SCIENCE JOURNAL, 2006, 54 (03): : 129 - 133